Employee termination policy

PURPOSE This policy provides termination guidelines, including the process of disabling former employee access, reclaiming company equipment and finalizing payroll/benefits details. It complements our Employee termination checklist, which should be fil…

March 13, 2023
Read More >>

Risk management policy

SUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to en…

March 8, 2023
Read More >>

Remote access policy

PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. It applies to scenarios where employees connect remotely to in-house data centers as well a…

March 8, 2023
Read More >>

Security Incident Response Policy

The Security Incident Response Policy from TechRepublic Premium describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. The policy’s purpose is to define for employees, IT d…

March 7, 2023
Read More >>

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this in mind, it …

February 23, 2023
Read More >>

Security Awareness and Training Policy

A security policy is only as valuable as the knowledge and efforts of those who adhere to it, whether IT staff or regular users. Understanding the importance of computer and network security, and building accountability for these concepts, is critical …

February 13, 2023
Read More >>

Internet and Email Usage Policy

This policy from TechRepublic Premium sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack) and social networking services in business …

February 9, 2023
Read More >>

Auditing and Logging Policy

Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities. These activities include network traffic, internet access, creating or deleting users, adding users to groups, changing…

February 2, 2023
Read More >>

Access Management Policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs…

February 1, 2023
Read More >>

IT Staff Systems and Data Access Policy

IT professionals, such as system and network administrators, help desk staff, management personnel and sometimes external vendor representatives, are routinely provided full access to company servers, network devices and data so that they can effective…

January 31, 2023
Read More >>